[图书][B] Algebra II Ring Theory: Vol. 2: Ring Theory

C Faith - 2012 - books.google.com
The term The Theory of Rings seems first used as title of a book by Jacobson [43], and in his
preface Jacobson asserts that the theory that forms the subject of the book had its beginning …

A linear decomposition attack

A Myasnikov, V Roman'kov - Groups Complexity Cryptology, 2015 - degruyter.com
We discuss a new attack, termed a dimension or linear decomposition attack, on several
known group-based cryptosystems. This attack gives a polynomial time deterministic …

A nonlinear decomposition attack

V Roman'kov - Groups Complexity Cryptology, 2016 - degruyter.com
This paper introduces a new type of attack, termed a nonlinear decomposition attack,
against two known group-based key agreement protocols, namely, protocol based on …

The representation type of local algebras

CM Ringel - Representations of Algebras: Proceedings of the …, 2006 - Springer
Let k be a (commutative) field, and k< X1,•••, Xn> the free associative algebra in n (non-
commuting) variables. Denote by Mi the ideal of k< X1,.••, Xn> generated by all monomials …

Two general schemes of algebraic cryptography

V Roman'kov - Groups Complexity Cryptology, 2018 - degruyter.com
In this paper, we introduce two general schemes of algebraic cryptography. We show that
many of the systems and protocols considered in literature that use two-sided multiplications …

Using semidirect product of (semi) groups in public key cryptography

D Kahrobaei, V Shpilrain - Conference on Computability in Europe, 2016 - Springer
In this survey, we describe a general key exchange protocol based on semidirect product of
(semi) groups (more specifically, on extensions of (semi) groups by automorphisms), and …

Monoidal categories, representation gap and cryptography

M Khovanov, M Sitaraman, D Tubbenhauer - Transactions of the American …, 2024 - ams.org
The linear decomposition attack provides a serious obstacle to direct applications of
noncommutative groups and monoids (or semigroups) in cryptography. To overcome this …

Essays in algebra and cryptology: Algebraic cryptanalysis

V Roman'kov - 2018 - elibrary.ru
This book is concerned qith algebraic cryptography, where the design and analysis of
cryptographic schemes are based on algebraic structures: nonabelian groups, rings …

[HTML][HTML] The isomorphism problem for group algebras: a criterion

T Sakurai - Journal of Group Theory, 2020 - degruyter.com
Let R be a finite unital commutative ring. We introduce a new class of finite groups, which we
call hereditary groups over R. Our main result states that if G is a hereditary group over R …

Алгебраическая криптология

ВА Романьков - 2020 - elibrary.ru
Содержит теоретические основы и описания известных теоретико-числовых и
алгебраических конструкций в криптологии. Приводятся схемы, системы и протоколы …